
William H. Beisner
Examiner (ID: 3722, Phone: (571)272-1269 , Office: P/1799 )
| Most Active Art Unit | 1744 |
| Art Unit(s) | 1303, 1642, 1799, 1744, 1815, 1801, 1809, 1775, 1807, 1797 |
| Total Applications | 2507 |
| Issued Applications | 1495 |
| Pending Applications | 315 |
| Abandoned Applications | 716 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10771333
[patent_doc_number] => 20160117489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'SUPPORTING SECONDARY USE OF CONTENT OF ELECTRONIC WORK'
[patent_app_type] => utility
[patent_app_number] => 14/919302
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 20499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919302
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919302 | Supporting secondary use of content of electronic work | Oct 20, 2015 | Issued |
Array
(
[id] => 11593793
[patent_doc_number] => 20170118204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'TECHNIQUES FOR HEARABLE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/919555
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6354
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919555
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919555 | Techniques for hearable authentication | Oct 20, 2015 | Issued |
Array
(
[id] => 10766290
[patent_doc_number] => 20160112445
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'JOINED AND COORDINATED DETECTION, HANDLING, AND PREVENTION OF CYBERATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/919506
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 18962
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919506
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919506 | Joined and coordinated detection, handling, and prevention of cyberattacks | Oct 20, 2015 | Issued |
Array
(
[id] => 11593839
[patent_doc_number] => 20170118250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'METHOD FOR MINIMIZING THE RISK AND EXPOSURE DURATION OF IMPROPER OR HIJACKED DNS RECORDS'
[patent_app_type] => utility
[patent_app_number] => 14/919270
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7369
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919270
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919270 | Method for minimizing the risk and exposure duration of improper or hijacked DNS records | Oct 20, 2015 | Issued |
Array
(
[id] => 15859625
[patent_doc_number] => 10645120
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Policy management for data migration
[patent_app_type] => utility
[patent_app_number] => 14/863804
[patent_app_country] => US
[patent_app_date] => 2015-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10828
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14863804
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/863804 | Policy management for data migration | Sep 23, 2015 | Issued |
Array
(
[id] => 11531481
[patent_doc_number] => 20170091459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'Machine Learning Statistical Methods Estimating Software System\'s Security Analysis Assessment or Audit Effort, Cost and Processing Decisions'
[patent_app_type] => utility
[patent_app_number] => 14/863641
[patent_app_country] => US
[patent_app_date] => 2015-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5465
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14863641
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/863641 | Machine learning statistical methods estimating software system's security analysis assessment or audit effort, cost and processing decisions | Sep 23, 2015 | Issued |
Array
(
[id] => 12175742
[patent_doc_number] => 09893894
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-13
[patent_title] => 'Systems, methods, and devices for secure device-to-device discovery and communication'
[patent_app_type] => utility
[patent_app_number] => 14/863168
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 12412
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14863168
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/863168 | Systems, methods, and devices for secure device-to-device discovery and communication | Sep 22, 2015 | Issued |
Array
(
[id] => 12201738
[patent_doc_number] => 09904805
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'Cryptographic cache lines for a trusted execution environment'
[patent_app_type] => utility
[patent_app_number] => 14/863353
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 24
[patent_no_of_words] => 23344
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14863353
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/863353 | Cryptographic cache lines for a trusted execution environment | Sep 22, 2015 | Issued |
Array
(
[id] => 13007621
[patent_doc_number] => 10027489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => Digital rights management system and method
[patent_app_type] => utility
[patent_app_number] => 14/837145
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8009
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837145
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837145 | Digital rights management system and method | Aug 26, 2015 | Issued |
Array
(
[id] => 11460654
[patent_doc_number] => 20170054560
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'SECURE DATA STORAGE AND TRANSFER FOR PORTABLE DATA STORAGE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/833132
[patent_app_country] => US
[patent_app_date] => 2015-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5777
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833132
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833132 | SECURE DATA STORAGE AND TRANSFER FOR PORTABLE DATA STORAGE DEVICES | Aug 22, 2015 | Abandoned |
Array
(
[id] => 11042685
[patent_doc_number] => 20160239641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'Method and System for Scan and Matching Media for Streaming Authorization'
[patent_app_type] => utility
[patent_app_number] => 14/832921
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7309
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832921
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832921 | Method and System for Scan and Matching Media for Streaming Authorization | Aug 20, 2015 | Abandoned |
Array
(
[id] => 17209731
[patent_doc_number] => 11170104
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-09
[patent_title] => Identifying attacks on file systems
[patent_app_type] => utility
[patent_app_number] => 14/832899
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10205
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832899
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832899 | Identifying attacks on file systems | Aug 20, 2015 | Issued |
Array
(
[id] => 11461242
[patent_doc_number] => 20170055148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'APPARATUS AND METHOD FOR SHARING WIFI SECURITY DATA IN AN INTERNET OF THINGS (IOT) SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/832905
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 19599
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832905 | Apparatus and method for sharing WiFi security data in an internet of things (IoT) system | Aug 20, 2015 | Issued |
Array
(
[id] => 11490152
[patent_doc_number] => 09596231
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-14
[patent_title] => 'Grid-based authentication on touch-aware devices'
[patent_app_type] => utility
[patent_app_number] => 14/832928
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 16
[patent_no_of_words] => 9731
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832928
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832928 | Grid-based authentication on touch-aware devices | Aug 20, 2015 | Issued |
Array
(
[id] => 10496339
[patent_doc_number] => 20150381362
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'Encryption System in a Virtualized Environment'
[patent_app_type] => utility
[patent_app_number] => 14/815950
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 25005
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815950
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815950 | Encryption System in a Virtualized Environment | Jul 30, 2015 | Abandoned |
Array
(
[id] => 10478576
[patent_doc_number] => 20150363593
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'APPARATUSES AND METHODS FOR PASSWORD AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/735099
[patent_app_country] => US
[patent_app_date] => 2015-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3193
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735099
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735099 | APPARATUSES AND METHODS FOR PASSWORD AUTHENTICATION | Jun 8, 2015 | Abandoned |
Array
(
[id] => 11511106
[patent_doc_number] => 09602279
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-21
[patent_title] => 'Configuring devices for use on a network using a fast packet exchange with authentication'
[patent_app_type] => utility
[patent_app_number] => 14/735069
[patent_app_country] => US
[patent_app_date] => 2015-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12784
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735069
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735069 | Configuring devices for use on a network using a fast packet exchange with authentication | Jun 8, 2015 | Issued |
Array
(
[id] => 14461241
[patent_doc_number] => 10326600
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Routing method of forwarding task instructions between computer systems, computer network infrastructure and a computer program product
[patent_app_type] => utility
[patent_app_number] => 15/315577
[patent_app_country] => US
[patent_app_date] => 2015-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 11492
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15315577
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/315577 | Routing method of forwarding task instructions between computer systems, computer network infrastructure and a computer program product | May 31, 2015 | Issued |
Array
(
[id] => 11188385
[patent_doc_number] => 09419806
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'Trusted certificate authority to create certificates based on capabilities of processes'
[patent_app_type] => utility
[patent_app_number] => 14/702986
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10909
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702986 | Trusted certificate authority to create certificates based on capabilities of processes | May 3, 2015 | Issued |
Array
(
[id] => 11404047
[patent_doc_number] => 20170024586
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'Device and Method for Transmitting Data'
[patent_app_type] => utility
[patent_app_number] => 15/302343
[patent_app_country] => US
[patent_app_date] => 2015-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5055
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15302343
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/302343 | Device and Method for Transmitting Data | Apr 8, 2015 | Abandoned |